Guest Contributor


By Devin Partida, Editor-in-Chief, ReHack.com In the modern world, businesses across all industries increasingly rely on the internet, and real estate is no different. Agents, homeowners, buyers and sellers, property managers, and landlords handle valuable information and transactions online. While digital tools are useful, efficient and accessible, they also increase the […]

Real Estate Cybersecurity Risks to Look for in 2023


By Juras Juršėnas, COO at Oxylabs.io When it comes to cybersecurity, organizations are constantly looking for new ways to improve their defenses. A promising area of research is combining cybersecurity with machine learning (ML). This way, organizations can create algorithms that automatically detect potential threats and take steps to mitigate […]

Machine Learning in CyberSec to Find Vulnerabilities and Prevent Attacks


By Tal Zamir, CTO, Perception Point Enterprise phishing attacks generally start with run-of-the-mill emails believed to come from a trusted source. An employee clicks on an outwardly innocuous link and unwittingly shares sensitive data or responds to seemingly unremarkable requests from someone posing as a company executive – and the […]

Watch Your Head: The Growing Risk of Top-Down Cyber Attacks




By Emily Newton, Editor-in-Chief at Revolutionized Magazine IoT cybersecurity is critical for safety and success in five key industries today. Manufacturing, supply chain, healthcare, energy and transportation businesses face higher than average risk of IoT-related security vulnerabilities. It is crucial for businesses in these industries to be aware of the risks […]

The Top 5 Industries that Need IoT Cybersecurity


By Dimitri Nemirovsky, Atakama Co-founder, and COO Data breach headlines arrive fast and furious, with examples aplenty. The constant assault on companies is well known – the attack surface continues to expand, and sophisticated attacks are becoming more common. So, when state and independent actors continuously change and increase their attack capabilities, […]

From Checkbox to Checkmate: Protecting Critical Data With Multifactor Encryption



By Gary Phipps, GRCP, CTPRP, VP Strategy & Business Transformation at CyberGRX There’s no question that we are marching steadily into an increasingly digital future. Nor should it surprise anyone that the vast majority of businesses are prioritizing digital transformation initiatives. Modernization efforts vary based on each company’s goals. However, […]

The Most Common Third-Party Security Gaps Businesses Should Focus On ...


By Idan Wiener, Co-founder and CEO of illustria The world of cybersecurity was rocked by The SolarWinds hack was a significant event as it demonstrated the potential for supply chain attacks to be used to gain access to a wide range of organizations. With these kinds of attacks, hackers target […]

The Next Software Supply Chain Attack Is Imminent, So How ...




By Zachary Amos, Features Editor at ReHack Nearly every industry in the global economy is becoming increasingly concerned about cybersecurity threats. Hackers are using various methods to access companies’ networks and systems to launch attacks, making it challenging for businesses to continue operating as usual. The construction industry is becoming more […]

Cybersecurity Risks in the Construction Industry


By Ralph Rodriguez, President and Chief Product Officer at Daon Cyber risks become more prevalent and sophisticated every day. As consumers look to increase their security online, passkeys may be the emerging solution they’re looking for. Passkeys, also referred to as multi-device credentials, provide a more secure alternative to passwords. […]

Five Things to Know about Passkeys for the Enterprise


By Scott Perry, Principal, Crypto and Digital Trust, Schellman For the past several months, crypto companies have been given the lion’s share of attention from boards, businesses and leadership for their failures when audited or assessed. While the consequences are warranted, unfortunately, it seems that the story of cryptography is […]

Beyond the Crypto Noise, Working Towards a Harmonic Digital Economy